1) Unhooking “Captain Unhook”
2) Boyson: Network Device Ransomware
3) BIOS Ransomware
McClure dives into the anatomy of a hack—from the modules being loaded into the process all the way down to comparing the clean and current versions. In user-land, malicious processes have the same access to hooks as the security products installed to protect the system.
McClure also goes through a PoisonTap: where eventhough the box is locked, a hacker can plug in and exploit the system. Using the refresh feature powered by Java Script, a Raspberry Pi Zero can be hacked where the Raspberry Pi becomes a network gateway and ransomware can be deployed.
McClure also touches on why BIOS hacks are a common
Discuss
Don’t have an account? Sign up now its fast and free.